2020
DOI: 10.1007/978-981-15-9739-8_15
|View full text |Cite
|
Sign up to set email alerts
|

Evil Chaincode: APT Attacks Based on Smart Contract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…• EVM Supported: The combination of Solidity + EVM is not the only choice for the smart-contract platform. However, compared to other platforms that tend to run smart contracts' code on bare metal [28], EVM's structure can naturally minimize the Remote Code Execution. In addition, as shown in Table II, GoQuorum tends to be the quickest one when testing the transaction performance by deploying comparatively a large quantity of data (e.g., a smart contract with 100KB of binaries or more).…”
Section: A Underlying Blockchain Platformmentioning
confidence: 99%
“…• EVM Supported: The combination of Solidity + EVM is not the only choice for the smart-contract platform. However, compared to other platforms that tend to run smart contracts' code on bare metal [28], EVM's structure can naturally minimize the Remote Code Execution. In addition, as shown in Table II, GoQuorum tends to be the quickest one when testing the transaction performance by deploying comparatively a large quantity of data (e.g., a smart contract with 100KB of binaries or more).…”
Section: A Underlying Blockchain Platformmentioning
confidence: 99%
“…Attacks are acts of doing harm to IT assets [ 10 ]. According to the analysis of the reviewed studies, they can be classified based on: (1) the targeted assets, such as Smart Contracts [ 112 ]; (2) the cause of the vulnerability, such as the double spending vulnerability in BC technologies [ 113 ]; (3) the mechanisms’ flaws, such as flaws in consensus mechanisms in BC [ 114 ]; and (4) the affected system architecture layers, such as the network layer [ 115 ]. In addition, a number of studies identified different attack vectors [ 74 , 88 , 107 , 114 , 116 ].…”
Section: Taxonomymentioning
confidence: 99%
“… [S89] Potential Risks of Hyperledger Fabric Smart Contracts [ 167 ] A survey showing 14 potential security risks related to the Smart Contracts that are written by Go language and used in Hyperledger Fabric BC; additionally, it proposes a tool to discover security risks in Smart Contracts. [S90] Evil Chaincode: APT Attacks Based on Smart Contract [ 112 ] Review study covering the advanced persistent threat (APT) attacks on Smart Contracts, which is an attack experiment on Hyperledger Fabric that provides recommendations to build countermeasures to security vulnerabilities in Smart Contracts. [S91] Penetration testing framework for Smart Contract Blockchain [ 107 ] A Review study and a penetration test for Smart Contracts, showing security threats and attack vectors in SC (categorized to network, application, data integrity, and end-user).…”
Section: Table A1mentioning
confidence: 99%